In today’s competitive environment of financial institutions, it’s difficult to stand out from the crowd – especially for the little guys. Big multibillion-dollar credit unions have healthy marketing budgets, marketing teams, business development professionals, sponsorship opportunities, advertising campaigns across multiple channels, commercials, and a strong social media presence. But how do the small credit unions …

Oppel was brought on as ombudsman to review the magazine's editorial processes and organizational structure. 'Texas Monthly' redesigned its site in January and reorganized its editorial team to covernew, specific verticals, including News & Politics, Being Texan and The Culture.

Employers’ increased use of various consumer reports coupled with the Fair Credit Reporting Act’s highly technical requirements has led to an uptick in employment-related FCRA class actions. In part 1 of this two-part article James Boudreau and Christiana Signs of Greenberg Traurig LLP discuss the most common types of claims in this area and response strategies.

Under the proposed bill, plastic bottles would be required to have tethered caps to ensure all material goes to the recyclerAssemblymember Mark Stone, a democrat representing the 29th California Assembly District, has reintroduced legislation to require plastic bottle caps to be tethered to their beverage containers. By banning bottles that don’t have attached caps, California will reduce one of the most prevalent sources of plastic…

On a gloomy February Monday, my day was brightened by a visit to a Virginia Quality Level 4 infant care classroom. Outside was rain, galoshes and umbrellas, but inside a cheery large room covered with soft mats and interactive toys held almost twe...

The Commission on Fiscal Stability and Economic Growth Thursday recommended giving regional councils of government or municipal consortiums an optional taxing power that would allow a new level of regional cooperation in the state. Third of three articles.

Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.